SlideShare a Scribd company logo
1 of 18
Risks in Social Media




    Jairo Suarez
Risks
•   Impact in jobs and school.
•   Effect in family, friends, opportunities.
•   Identity theft.
•   Cyber-bullying.
•   Loss of privacy.
•   Stalking.
•   Can’t be taken back.
Examples

1.   Comment
2.   Video
3.   Photo
4.   Tweet
5.   Post
1. Comment
“I am sorry I said I love Fidel Castro."
                - Ozzie Guillen
Social Mention
One-minute span
2. Videos
“They were for team building."
              - GSA Officials
Reactions
Social Mention
Two-minute span
Example 3 – Email

“I regret the harm that my actions
have caused my family, my staff and
        my constituents."
                  - Christopher Lee
Example 4 – Tweeter
                    Connor Riley, 22




A Cisco employee responded: “Who is the hiring manager?
I’m sure they would love to know that you will hate the
work. We here at Cisco are versed in the Web.”
Example 5 – Youtube
Pittsburgh
• Police caught
   thieves that
   stole thousands
   of dollars in
   cash and goods.
• They posed
   with their loot.
Example 6 – Facebook

• An employee called out sick from work, claiming
  that "she could not work in front of a computer
  as she needed to lie in the dark.“
• When she was discovered to be surfing Facebook
  from home, she was terminated.
Why It Happens
Inattention
• People post for friends; forget others may information.
• Mistakenly believe page will have relative privacy.
• Few have installed software to remotely wipe the
  device if it is lost or stolen.
• Social media users don’t know how to protect their
  privacy.
Why It Happens (cont’d)
Technology
• Easier to post: phones, iPad, free WiFi
• Internet provides a sense of anonymity.
• Lack of physical interaction provides false sense of
  security.
• No “friending” is needed to gain access.
• Interlinked pages, blogs, news, tweets are all visible to
  anyone and everyone.
• The beauty of the Web is that it is open, and anyone
  can crawl it.
Why It Happens (cont’d)
Badness
• Scammers
• Many websites share / sell private data
• Envy
• Drugs
Human Nature
• Grudges
• Jealousy
• Impulsive
• Peer pressure
Conclusion
• Removing information is like removing an
  unwanted tattoo.
• It is better to avoid the tattoo in the first place
  than to try to remove it later.
• There are no guarantees that you can even
  remove it completely.
• The only way is to prevent it from ever
  showing up.
“Golden Rule”


         “In Social Media, don’t
post, send, email, upload, attach, record
      anything you would not want
  your spouse, boss or a police officer
                 to see.”
Suggestions
1. Use Social Media to promote yourself personally and
    professionally.
2. Don’t surrender to peer pressure.
3. Learn to use privacy features.
4. Be alert against phishing scams.
5. Be wary of publishing any identifying information:
   – Pick a user name that doesn’t include any personal
       information.
   – Set up a separate email account that doesn’t use your
       real name.
   – Use a ‘strong’ passwords.
6. Keep your profile closed. Only allow friends to view it.

More Related Content

What's hot

Breaking news & social media
Breaking news & social mediaBreaking news & social media
Breaking news & social media
Erica Zucco
 
Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15
Sue DeRosier
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
Ray Brannon
 

What's hot (17)

Social Media Course Women In Business Conference
Social Media Course Women In Business ConferenceSocial Media Course Women In Business Conference
Social Media Course Women In Business Conference
 
Safer internet day 2017
Safer internet day 2017Safer internet day 2017
Safer internet day 2017
 
Manchester metropolitan university careers week
Manchester metropolitan university careers weekManchester metropolitan university careers week
Manchester metropolitan university careers week
 
Breaking news & social media
Breaking news & social mediaBreaking news & social media
Breaking news & social media
 
Writing For Social Media
Writing For Social MediaWriting For Social Media
Writing For Social Media
 
To tweet or not to tweet
To tweet or not to tweetTo tweet or not to tweet
To tweet or not to tweet
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
 
Social Media DOs and DON'Ts
Social Media DOs and DON'TsSocial Media DOs and DON'Ts
Social Media DOs and DON'Ts
 
Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia Presentation
 
Social Media Do's and Don'ts
Social Media Do's and Don'tsSocial Media Do's and Don'ts
Social Media Do's and Don'ts
 
Grade 6 presentation
Grade 6 presentationGrade 6 presentation
Grade 6 presentation
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...
Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...
Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...
 
Is privacy an issue
Is privacy an issueIs privacy an issue
Is privacy an issue
 
Is privacy an issue
Is privacy an issueIs privacy an issue
Is privacy an issue
 
Cyberbullying kbj
Cyberbullying kbjCyberbullying kbj
Cyberbullying kbj
 

Similar to Social Media final presentation risks

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
zackkay
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
sheena711714
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
Carlos Diclear Hijo
 

Similar to Social Media final presentation risks (20)

Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Social Media final presentation risks

  • 1. Risks in Social Media Jairo Suarez
  • 2. Risks • Impact in jobs and school. • Effect in family, friends, opportunities. • Identity theft. • Cyber-bullying. • Loss of privacy. • Stalking. • Can’t be taken back.
  • 3. Examples 1. Comment 2. Video 3. Photo 4. Tweet 5. Post
  • 4. 1. Comment “I am sorry I said I love Fidel Castro." - Ozzie Guillen
  • 6. 2. Videos “They were for team building." - GSA Officials
  • 9. Example 3 – Email “I regret the harm that my actions have caused my family, my staff and my constituents." - Christopher Lee
  • 10. Example 4 – Tweeter Connor Riley, 22 A Cisco employee responded: “Who is the hiring manager? I’m sure they would love to know that you will hate the work. We here at Cisco are versed in the Web.”
  • 11. Example 5 – Youtube Pittsburgh • Police caught thieves that stole thousands of dollars in cash and goods. • They posed with their loot.
  • 12. Example 6 – Facebook • An employee called out sick from work, claiming that "she could not work in front of a computer as she needed to lie in the dark.“ • When she was discovered to be surfing Facebook from home, she was terminated.
  • 13. Why It Happens Inattention • People post for friends; forget others may information. • Mistakenly believe page will have relative privacy. • Few have installed software to remotely wipe the device if it is lost or stolen. • Social media users don’t know how to protect their privacy.
  • 14. Why It Happens (cont’d) Technology • Easier to post: phones, iPad, free WiFi • Internet provides a sense of anonymity. • Lack of physical interaction provides false sense of security. • No “friending” is needed to gain access. • Interlinked pages, blogs, news, tweets are all visible to anyone and everyone. • The beauty of the Web is that it is open, and anyone can crawl it.
  • 15. Why It Happens (cont’d) Badness • Scammers • Many websites share / sell private data • Envy • Drugs Human Nature • Grudges • Jealousy • Impulsive • Peer pressure
  • 16. Conclusion • Removing information is like removing an unwanted tattoo. • It is better to avoid the tattoo in the first place than to try to remove it later. • There are no guarantees that you can even remove it completely. • The only way is to prevent it from ever showing up.
  • 17. “Golden Rule” “In Social Media, don’t post, send, email, upload, attach, record anything you would not want your spouse, boss or a police officer to see.”
  • 18. Suggestions 1. Use Social Media to promote yourself personally and professionally. 2. Don’t surrender to peer pressure. 3. Learn to use privacy features. 4. Be alert against phishing scams. 5. Be wary of publishing any identifying information: – Pick a user name that doesn’t include any personal information. – Set up a separate email account that doesn’t use your real name. – Use a ‘strong’ passwords. 6. Keep your profile closed. Only allow friends to view it.

Editor's Notes

  1. Criminals can use information provided about a person’s birthday, location, routine, hobbies, and interests to impersonate a trusted friend or convince the unsuspecting that they have the authority to access personal or financial data. They can even use such info to guess your account passwords—which is why you should never have a password that uses the name of your pet, favorite band, hobby, birthday, or something else easily known about you. And stalkers will really appreciate your help if you post your daily routine and whereabouts online!
  2. Criminals can use information provided about a person’s birthday, location, routine, hobbies, and interests to impersonate a trusted friend or convince the unsuspecting that they have the authority to access personal or financial data. They can even use such info to guess your account passwords—which is why you should never have a password that uses the name of your pet, favorite band, hobby, birthday, or something else easily known about you. And stalkers will really appreciate your help if you post your daily routine and whereabouts online!
  3. Criminals can use information provided about a person’s birthday, location, routine, hobbies, and interests to impersonate a trusted friend or convince the unsuspecting that they have the authority to access personal or financial data. They can even use such info to guess your account passwords—which is why you should never have a password that uses the name of your pet, favorite band, hobby, birthday, or something else easily known about you. And stalkers will really appreciate your help if you post your daily routine and whereabouts online!